How vulnerabilities are tracked
CVE — Common Vulnerabilities and Exposures
A CVE is a standardized identifier used to name and track publicly disclosed security vulnerabilities. Each record takes the formCVE-YYYY-NNNNN (year + sequence number).
Example: The Stuxnet worm (2010) exploited multiple CVEs simultaneously, including CVE-2010-2568 (a Windows LNK file parsing flaw) as its primary vector.
CVE records are maintained by MITRE and are the universal language for discussing specific vulnerabilities across vendors, tools, and databases.
Related concepts: NVD, CVSS, security bulletins, vulnerability management, patch management.
NVD — National Vulnerability Database
The NVD (National Vulnerability Database) is a public U.S. government-run database that catalogs known security vulnerabilities, indexed by CVE IDs. It enriches raw CVE data with:- CVSS severity scores
- Affected product/version mappings (CPE)
- Remediation guidance links
- References to vendor advisories
CVSS — Common Vulnerability Scoring System
CVSS provides a numerical score (0–10) representing the severity of a vulnerability. Scanners like Nessus and OpenVAS report CVSS scores alongside their findings.| Score Range | Severity |
|---|---|
| 0.0 | None |
| 0.1 – 3.9 | Low |
| 4.0 – 6.9 | Medium |
| 7.0 – 8.9 | High |
| 9.0 – 10.0 | Critical |
CVSS scores reflect theoretical severity, not real-world exploitability. A CVSS 9.8 vulnerability with no public exploit and a compensating control may be lower priority than a CVSS 7.0 vulnerability actively being exploited in the wild.
Scanning Tools
nmap — Network Mapper
nmap is the standard tool for network discovery and port scanning. It tells you which hosts are up, which ports are open, and what services and versions are running.
nikto — Web Server Scanner
nikto scans web servers for dangerous files, outdated software versions, and misconfigurations.
- Default credentials on common applications
- Sensitive files accidentally exposed (
.env, backup files,.git) - Missing security headers (
X-Frame-Options,Content-Security-Policy) - Outdated server software with known CVEs
OWASP ZAP — Zed Attack Proxy
OWASP ZAP is an open-source web application security scanner that works as an intercepting proxy. It can:- Crawl web applications and map all endpoints
- Passively flag issues while you browse manually
- Run automated active scans against discovered content
- Intercept and modify HTTP requests for manual testing
OpenVAS / Greenbone
OpenVAS (now part of the Greenbone Vulnerability Management suite) is a comprehensive, free vulnerability scanner. It maintains a continuously updated feed of Network Vulnerability Tests (NVTs) and produces detailed reports with CVSS scores and remediation steps.Nessus
Nessus (by Tenable) is a commercial vulnerability scanner widely used in enterprise environments. The free Nessus Essentials tier allows scanning up to 16 IP addresses and is suitable for learning and home lab use. Key capabilities:- Credentialed scans (logs into hosts to find local vulnerabilities)
- Compliance checks against CIS benchmarks
- Plugin library of 100,000+ checks updated daily
- CVSS-scored findings with remediation guidance
Vulnerability scanning workflow
Define scope
List the IP ranges, hostnames, and application URLs you are authorized to scan. Document this before you start.
Port and service enumeration
Run a full service-version scan (
nmap -sV -p-) to understand what is exposed on each host.Vulnerability detection
Run NSE scripts (
nmap --script vuln), nikto (for web servers), or a full OpenVAS/Nessus scan to identify known vulnerabilities.Prioritize findings
Use CVSS scores as a starting point, then factor in exploitability (is there a public exploit?) and the value of the affected asset.